Secure your wireless network

- We will not cover step by step wireless router configuration as these steps might differ depending on your router type/manufacture. However, we will concentrate on securing managed wireless network.- This article refers to Home Wireless network [802.11?]

How to secure wireless network?

1. Use relatively strong passphrase as your ESSID.- This will not prevent brute-force attacks. However, it will make for anyone difficult to guess your ESSID

2. Disable broadcast of SSID/ESSID.- This will prevent your wireless network/essentially router visibility when any Wi-Fi device tries to automatically connect available wireless network to its vicinity.- Provide ESSID to only those whom you trust.

4. Enable MAC address based access control list (ACL) on your wireless router. Add MAC addresses of those trusted devices from your network manually whom you want to allow access.- This will reject any device trying to register wireless network/router whose MAC address is not listed in access control list.

6. Enable logging mechanism. Try to send logs to email account provided by your ISP. You can also use free email service providers such as yahoo/hotmail/gmail as they provide unlimited space. Point is try to store logs to any other location than your router.

Mandar is a seasoned software professional for more than a decade. He is Cloud, AI, IoT, Blockchain and Fintech enthusiast. He writes to benefit others from his experiences. His overall goal is to help people learn about the Cloud, AI, IoT, Blockchain and Fintech and the effects they will have economically and socially in the future.

Built on R3’s blockchain platform, Corda, the Euro Debt Solution application has successfully completed a live commercial paper transac...

Instagram

TL;DR ToS

NOTHING on this website should be construed as financial advice or a solicitation of investment. Digital currencies and tokens are emerging technologies that carry inherent risks of high volatility. We strongly recommend that you consult your financial advisor before investing, speculating or trading in any currency, digital currency, or security. Decisions based on information contained on this site are the sole responsibility of the user, and in exchange for using this site, you agree to hold Sutram Internet Private Limited and/or TechSutram and its partners, owners, authors, and affiliates harmless against any claims for damages arising from any decision you make based on such information. See full terms and conditions for more.

Call for Writers

We are always looking for quality content, news, and analysis about Blockchain / Cryptocurrencies, Cloud computing, IoT and AI. If you have an article you'd like to have published to our audience please reach out to write@techsutram.com

TechSutram is independent publication to let people know how Blockchain, Cloud Computing, IoT, AI and Startups ecosystems are working together.